Search In this Thesis
   Search In this Thesis  
العنوان
Design of new algorithms in symmetric cryptography/
الناشر
Fatma Ahmed Aly,
المؤلف
Aly,Fatma Ahmed.
الموضوع
Cryptography . Symmetric cryptography .
تاريخ النشر
2010 .
عدد الصفحات
i-xx+97 P.:
الفهرس
Only 14 pages are availabe for public view

from 130

from 130

Abstract

In the age of universal electronic connectivity, electronic eavesDROPping, and electronic frauds, security is vital for any success. Designing a secure way to talk, taking in our account that other parties hear but the one who unders~ds is the one you are talking to. Developing a secure way to be published all over the world, while nobody can break what two parties decided to protect. These are our endeavor.
Thesis consists of seven chapters, discussing the following topics: basic pre-computer cryptography, rotors as encryption algorithms and analysis, cryptanalysis of some of well known rotor based on cryptosystem [ENIGMA and SIGABA], new proposed (;rypto systems that are designed by the author, and finally Chapter provides a brief for the results of the thesis
First chapter discussed twelve points which can be considered as a brief introduction to the science of cryptography. These points are as foHows: first and second point, a historical time line of cryptography showing the evolution of cryptography through. Third and fourth point discusses strength and goals of the cryptosystem. Fifth and sixth point discusses cryptosystems classifications according to type of key used including a detailed comparison between these types from several points of view. The seventh point discusses the difference between block and stream cipher. Eighth point discusses One-Time Pad. Ninth and tenth point of discussing the types of attack from the standpoint of the necessary resources and is, time, memory and data. Eleventh point discusses the main principles of cryptography developed by Kerckhoff in nineteen’s century. Twelfth point discJlsses the
first information theory ever developed by Shannon in 1948. \
Second chapter discusses the four points, and these points are as follows: The first point is a historical time frame of the rotor and the rotor is shown beginning in 1930 until its development in the Second World War. The second point and discussed rotor construction. The third point discusses the principles of rotor encryption. The fourth point discusses and cryptanalysis of rotor with corresponding plaintext and ciphertext.
The third chapter, which consists of two parts; Part I discusses the famous rotor:
ENIGMA. The second part is displays the famous American rotor: SIGABA.
Fourth, fifth and sixth chapters discuss the new proposed cryptosystems designed by the author. First cipher is RTCKP cipher, which was published in NRSC 2009, Egypt. RTCKP discussion contains the following points: first, detailed structure (single round and overall structure), key generation, and software implementation. Second, RTCKP cryptanalysis which discussed brute force attack, frequency cryptanalysis and period.
Second cipher is SEU _ GPS cipher. SEU _ GPS discussion contains the following points: first, detailed structure (single round and overall structure), key generation, and software implementation. Second, SEU _ GPS cryptanalysis which discussed brute force attack, frequency cryptanalysis and period.